Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
The automated system for detecting cyber bot attacks in 5G networks relies on cloud servers to store data, facilitating the global access necessary for online transactions and services, but points to the rise of cybercrime with information security flaws and human stealth Attackers known as "...
| Main Authors: | Thrupthi, C.P., Chitra, K., Harilakshmi, V.M. |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2068/ http://eprints.intimal.edu.my/2068/2/609 http://eprints.intimal.edu.my/2068/3/joit2024_31b.pdf |
Similar Items
Recognize Hate Speech On Twitter Using Machine Learning
by: Yashaswini, Kini, et al.
Published: (2024)
by: Yashaswini, Kini, et al.
Published: (2024)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
GIS-Enhanced Crop Yield Modeling with Machine Learning
by: Venkatesh, S.D., et al.
Published: (2024)
by: Venkatesh, S.D., et al.
Published: (2024)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024)
by: Keerthana, S.N, et al.
Published: (2024)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
by: Rahman, Md. Arafatur, et al.
Published: (2021)
by: Rahman, Md. Arafatur, et al.
Published: (2021)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019)
by: Mubarak, Sinil, et al.
Published: (2019)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Pro Paws Feeder For Cats And Dogs Using Arduino And Telegram Bot
by: Muhammad Amirul Iman, Hassan
Published: (2022)
by: Muhammad Amirul Iman, Hassan
Published: (2022)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Quality Of Service Aware User Association For Efficient Network Slicing In Multi-Tenant 5g Networks
by: Swathi, Subbiah Jayanthi
Published: (2022)
by: Swathi, Subbiah Jayanthi
Published: (2022)
Text to Image Generation Using Machine Learning
by: Rishab, Tiwari, et al.
Published: (2024)
by: Rishab, Tiwari, et al.
Published: (2024)
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
by: Ahmad, Rabiah, et al.
Published: (2012)
by: Ahmad, Rabiah, et al.
Published: (2012)
Similar Items
-
Recognize Hate Speech On Twitter Using Machine Learning
by: Yashaswini, Kini, et al.
Published: (2024) -
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014) -
GIS-Enhanced Crop Yield Modeling with Machine Learning
by: Venkatesh, S.D., et al.
Published: (2024) -
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)